3 Ways to Streamline Network Security Automation That Will Transform Your Organization

Network security automation uses machines to programmatically execute security tasks. Typically, network security automation is used to manage the low-complexity, high-volume aspects of detection, investigation, and mitigation. For instance, automation… Continue reading 3 Ways to Streamline Network Security Automation That Will Transform Your Organization

Why We’re Thankful for You – the Network Security Professional

Network security professionals are unsung heroes. Everyday news app visitors won’t read about all the wonderful work you’re doing. On occasion, they’ll only see and read about fellow professionals having the worst days of their lives. But while the hea… Continue reading Why We’re Thankful for You – the Network Security Professional

Network Security, Performance & Scalability | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the fourth: scale & perform. “Agil… Continue reading Network Security, Performance & Scalability | The 5 Critical Success Factors to Agile NSPM

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could only perform simple packet filtering. But ev… Continue reading Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the third: adapt to change.  Pillar #3… Continue reading Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM

Integrate Anywhere: API-First Agile Approach | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the second: integration. Pillar #2 – I… Continue reading Integrate Anywhere: API-First Agile Approach | The 5 Critical Success Factors to Agile NSPM

See Everything: Continuous Visibility Across Your Hybrid Network | The 5 Critical Success Factors to Agile NSPM

We’re in the middle of a business model revolution. Transformation, automation, and globalization are enabled by emerging technologies like artificial intelligence, IoT, mobile, and cloud-native apps. As a result, the typical enterprise network is a mi… Continue reading See Everything: Continuous Visibility Across Your Hybrid Network | The 5 Critical Success Factors to Agile NSPM

Myth #2: Compliance Is Only Urgent When There’s an Audit

This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read part #1 here.  Many organizations have adopted a passive compliance playbook. Since they don’t k… Continue reading Myth #2: Compliance Is Only Urgent When There’s an Audit

Network visibility is a differentiator for innovation

Before working for FireMon, I was a cybersecurity professional at a Fortune 500 where I inherited a lot of firewalls with a lot of rules. Complexity was king, and chaos reigned, but implementing FireMon made all the difference in managing our network. … Continue reading Network visibility is a differentiator for innovation

Risk Mitigation Requires Complete Visibility

You can’t fully mitigate risk without a complete picture of what you must manage. However, visibility is a moving target as new endpoints and devices are added to your infrastructure daily.  To maintain full vis… Continue reading Risk Mitigation Requires Complete Visibility